Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up
Network Computing Archives
2009
  • August 2009
    This digital issue marks the return of Network Computing, the only magazine For IT, By IT. As part of our Green Initiative, we're providing digital products in lieu of printed ones in an effort to reduce our carbon footprint.

    • WAN Optimization And App Delivery Go Virtual: You want max performance in virtual environments. We look at how WAN optimization appliances and app delivery controllers can deliver it.
    • Secure Switch: ConSentry's latest version of its NAC appliance is much improved, but there's still one hole left behind that you'll need to watch for.
    • Anti-Spam Star: Abaca's reputation technology slows spam to a crawl.
    • Open Standards Manifesto: One IT director's rallying cry for open standards development and conformance.
2007
  • June 11: Special Issue: IT Automation; Best of Interop 2007 Award Winners
  • May 28: Analysis: Mobility Apps; Fixed Wireless; Point-to-Point Systems Review;
  • May 15: Optimizing Your WAN; Web Applications Scanners; NAC: More Is More
  • April 30: Enterprise Key Management; Mobile Instant Messaging; Carrier Ethernet
  • April 16: Automated Code Scanners; Holistic Application Performance Management; Out-of-Band Management
  • April 2: VMWare; The State of Business Intelligence; MIT's iFind Service
  • March 19: On Location: Chicago Transit; Data De-Duping; Extrusion-Prevention Systems
  • March 5: Software as a Service; User-Friendly Linux; Analysis: Browser Security
  • February 19: ILM; Microsoft Office Alternatives; Rich Internet Applications; Data Center Design: Outsourcers Notebook
  • February 5: Voice Over Wireless LAN; IM Security Appliances
  • January 22: CMDBs; Longhorn; Federated Identity Management
2006
  • December 21: 2007 Survivor's Guide
  • December 7: Next-Gen Blade Servers; Architecting for Data Security; Cisco Vs. Meru; TCO Wireless Network
  • November 23: Physical/Logical Security; Enterprise WANs; Linux Provisioning Suites; Rootkit Detection
  • November 9: 2007 NWC Reader Survey; Full-Disk Encryption Suites
  • October 26: Web 2.0 Technologies; Hosted Desktop Management; Autonomic Computing
  • October 12: Network Access Control; SaaS; Content-Addressable Storage
  • October 5: Host Intrusion Prevention; Analysis: Metro Wi-Fi; New Media in the Enterprise
  • September 28: Compliance Policy Development; Data Leak Prevention Tools; 10 Steps to Mobilization
  • September 21: Analysis: Unified Communications; Review: DNS/DHCP Appliances
  • September 14: Customized Systems Management Suites; Long-Term Storage
  • August 31: Wide-Area Wireless; Application Virtualization; Identity Theft Protection
  • August 3: Understanding SOA Governance; Review: Managed Security Service Providers; Data Center Power
  • July 20: Standards Special Report; Chips for Server Virtualization
  • July 6: SOA Management Suites; Enterprise Rights Management; Network Access Control
  • June 22: Wireless IDS/IPS; Service Delivery Modeling Strategies
  • June 8: The All IP Enterprise; Strategic Security: Risk Assessment
  • May 25: Market Analysis: SIM; Leasing IT Equipment; AJAX: A Quicker Way to Freshen Your Web Pages
  • May 11: Enterprise Wireless LANs; AD Policy Administration Suites; 2006 Best of Interop Awards; WLAN Spectrum Analysis
  • April 27: The 12th Annual Well-Connected Awards; Market Analysis: Web Application Firewalls; Wide Area File Services
  • April 13: Tech U: Tomorrow's IT Challenges Today
  • April 1: Outsourced Data Center Services; Wikis In The Enterprise; Desktop Management Suites; Interior Routing Protocols
  • March 16:Market Analysis: Enterprise Service Bus; Review: Data Center Switches
  • March 2: Disaster-Recovery Planning; Radio-Tested WLAN Clients; Unix Road Map
  • February 16: On Location: MedicAlert; E-Mail Authentication; Plan an iSCSI SAN
  • February 2: Market Analysis: Continuous Data Protection; Streaming Media Servers; WPA2 Security
  • January 19: Market Analysis: Real-Time User Monitoring; VoIP for SMBs; Wireless Presentation Systems
2005
  • December 16: 2006 Survivor's Guide
  • December 8: Supply Chain Management; WLAN Analysis Tools; Performance Monitor Buyer's Guide
  • November 24: Tape Encryption; Spam Filters; Emerging Enterprise
  • November 10: Network Node Validation; VoWLANs; All-in-One Security Appliances Buyer's Guide
  • October 27: Wireless Broadband; Web Conferencing Services
  • October 10: Market Analysis: Business Intelligence; Security Outsourcing; Buyer's Guide: HIPAA Compliance Products
  • October 1: Unified Messaging; NWC's Syracuse Labs Get a Makeover; Digital Signatures
  • September 22: Anti-spyware Suites; Annual Reader Survey Results; Service Level Management
  • September 14: Fixed Wireless Systems; Virtual Machine Technology; Disk-to-Disk-to-Tape Software
  • September 1: Business Service Management; Hosted CRM Software; Mesh Configurations and Applications
  • August 18th: On Location: SkyWest Airlines' Desktop Management Project; Review: IP KVMs
  • August 4th: Intelligent Storage Fabrics; Review: WAN Services; SOA Demystified
  • July 21th: Mobile Messaging Gateways; Microsoft: The Road Most Traveled
  • July 7th: Business Process Management Suites; Web Analytics Products
  • June 23th: Market Analysis: WLAN Security; RFID
  • June 9th: Market Analysis: IP Contact Centers; BPL Technology
  • May 26th: Special Issue: "This Old Data Center"
  • May 12th:E-Mail Archiving; IP Phone Buyer's Guide; Best of Interop Awards
  • April 28th: 11th Annual Well-Connected Awards; Firewall Blowout
  • April 14th: Storage Security; Understanding IT Pricing
  • April 1st: Desktop Management; Blocking WLAN Interference
  • March 17th: Enterprise VoIP Solutions; IP PBXs
  • March 3rd: On Location: American Airlines Center's Wi-Fi Network; Web Application Servers
  • February 17th: Enterprise WLANs; Content Switches
  • February 3rd: Fortifying Your Network-Access Control; Authentication Tools
  • January 20th: Offshore application development; Intrusion-Protection Systems
2004
  • December 16th: The Survivor's Guide to 2005
  • December 9th: Network Forensics; Negotiating IT Contracts
  • November 25th: Special Issue: Geeks Illustrated; WAN Accelerators
  • November 18th: Web Application Performance Monitors; A Database Fix for the File System
  • November 11th: Third Annual Reader Survey; iSCSI Targets
  • October 28th: Building a Top-Flight Infrastructure; Vendor Profile: Cisco
  • October 14th: Wide-Area Wireless Data; Desktop Firewalls
  • October 1st: Asset Management; Console Servers
  • September 16th: Enterprise Information Integration; Web Log Analysis
  • September 2nd: Special Issue: Affordable IT
  • August 19th: On Location: Chicago Tribune; Making E-Signatures Count
  • August 5th: Web Analytics; Preparing for the Americans with Disabilities Act
  • July 22nd: Branch Office Management; Session Initiation Protocol Phones
  • July 8th: IAM Suites; Setting up Intrusion Detection Systems
  • June 24th: The State of VoIP; Webcasting Software
  • June 10th: Storage Virtualization Revisited; Managing Your Web Services
  • May 27th: Special Issue: The State of Wireless Networking
  • May 13th: The 10th Annual Well-Connected Awards; SPAM Solutions
  • April 29th: Host-Based Protection Protects Servers; Host Intrusion Prevention Software
  • April 15th: Choosing the Right Wireless Application Platform; Enterprise Portals Suites
  • April 1st: Painless (Well, Almost) Patch Management Procedures; Enterprise Groupware Products
  • March 18th: Document Management; All-in-One Security Appliances
  • March 4th: Building Secure Enterprise WLANs; Tape Backup Solutions
  • February 19th: On Location: Policy Enforcement; Performance Management Software
  • February 5th: Linux Special Issue
  • January 22nd: Disaster Recovery Planning; Network-Based VPN Services
2003 2002 2001 Find older issues of Network Computing


Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers